
工学博士。1962-10出生,深圳北理莫斯科大学工程系首席教授、IEEE Fellow。研究方向为多媒体取证与安全、AI安全。
教育
西安电子科技大学电子对抗专业, 工学学士。1982.1;
清华大学通信与电子系统专业,工学硕士。1987.12;
中科院自动化所模式识别与智能系统专业,工学博士。1998.12
曾任职、学术兼职
桂林电子工业学院助教、讲师;汕头大学讲师、副教授、教授,汕头大学工学院副院长、院长;中山大学教授,信息科学与技术学院副院长、院长,教育部信息xxx重点实验室(中山大学)主任、广东省信息安全技术重点实验室(中山大学)主任;深圳大学信息工程学院特聘教授、广东省智能信息处理重点实验室(深圳大学)主任。
学术荣誉
国家杰出青年科学基金获得者, 2003
IEEE Fellow, 2015
广东省“特支计划”杰出人才, 2017
曾主持的主要科研项目
1) NSFC-企业创新联合基金重点项目“社交网络虚假媒体内容检测关键技术的研究”(U19B2022),2020.1-2023.12。
2) NSFC-通用技术基础研究联合基金重点项目“基于大数据的信息隐藏与对抗技术” (U1636202),2017.1-2020.12。
3) NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(U1135001),2012.1-2015.12。
4) 国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究”(60633030)。220万。2007.1-2010.12
5) 国家重点研发计划课题“基于免疫的网络动态风险评估与控制技术” (2020YFB1805404)2020 .11~。
6) 国家973计划项目课题“网络可视媒体安全”( 2011CB302204), 2011.9-2015.8。
7) 国家973计划项目课题“基于内容的可视媒体安全”(2006CB303104),2006.9-2010.8。
8) 广东省重点领域研发计划“网络信息安全”重点专项开放课题“面向AI安全的伪造音视频取证分析关键技术,”2019.1~2022.12。
9) 阿里巴巴“图像篡改检测与定位”,2020.11.01~2021.10.31
10) 阿里巴巴“媒体认证技术认证”,2017.12~2018.11。
科研教学获奖
可视媒体几何计算的理论与方法。国家自然科学二等奖(排名第二), 2015。
稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(排名第一),2004。
信息隐藏理论与方法。中国计算机学会科学技术奖自然科学一等奖(排名第一), 2019。
全方位实践驱动的创新型IT人才培养模式研究。广东省高等教育省级教学成果一等奖(排名第一),2010
发明专利:
获国家发明专利授权60多件。部分成果在国家有关部门和工业界应用。
研究生
培养博士后/博士生40多名、硕士生70多名
论文和学术影响
发表论文近400篇。论文被引用23000多次(google scholar)。H-index: 79
近3年发表的部分论文
[1] Shunquan Tan, Long Zhuo, Shenghai Luo, Han Chen, Bin Li, Jiwu Huang, “Evading detection actively: toward anti-forensics against forgery localization,” IEEE Trans. on Dependable and Secure Computing. Accepted
[2] Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex Kot, “Forgery-aware adaptive learning with vision transformer for generalized face forgery detection,” IEEE Trans. on Circuits and Systems for Video. Accepted
[3] Peijia Zheng, Xiongjie Fang , Zhipeng Zhou , Rui Yang , Wei Lu , Xiaochun Cao , Jiwu Huang, “Accurate and efficient privacy-preserving feature extraction on encrypted images,” IEEE Trans. on Dependable and Secure Computing. Accepted
[4] Guoyuan Lin, Weiqi Luo, Peijia Zheng, Jiwu Huang, “An audio watermarking method against re-recording distortions” Pattern Recognition, January 2025 https://doi.org/10.1016/j.patcog.2025.111366
[5] Qilin Yin, Wei Lu, Xiaochun Cao, Xiangyang Luo, Yicong Zhou, Jiwu Huang, “Fine-grained multimodal deepfake classification via heterogeneous graphs” International Journal of Computer Vision, 132(11): 5255-5269, 2024
[6] Kangkang Wei, Weiqi Luo, Jiwu Huang, “Color Image Steganalysis based on pixel difference convolution and enhanced transformer with selective pooling,” IEEE Trans. on Information Forensics & Security. vol.19, No.11, 9970-9983, Nov. 2024
[7] Wenmin Huang, Weiqi Luo, Jiwu Huang, “Interactive Generative Adversarial Networks with High-Frequency Compensation for Facial Attribute Editing,” IEEE Trans. on Circuits and Systems for Video Technology. vol. 34, No.9, Sep., 2024
[8] Zhaoyang Zhang, Shen Wang, Guopu Zhu, Dechen Zhan, Jiwu Huang, “Adversarial perturbation prediction for real-time protection of speech privacy,” IEEE Trans. on Information Forensics & Security. vol. 19, pp. 8701-8706, Sep. 2024
[9] Xianhao Tian, Peijia Zheng, Jiwu Huang, “Secure deep learning framework for moving object detection in compressed video,” IEEE Trans. on Dependable and Secure Computing. 21(4): 2836-2851, 2024.
[10] Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang. “Detection of deepfake videos using long-distance attention,” IEEE Trans. on Neural Networks and Learning Systems. vol. 35, No. 7, pp. 9366-9379, July 2024
[11] Rongxuan Peng, Shunquan Tan, Xianbo Mo, Bin Li, and Jiwu Huang, “Employing reinforcement learning to construct a decision-making environment for image forgery localization,” IEEE Trans. on Information Forensics & Security. vol. 19, pp. 4820-4834, May 2024
[12] Peijia Zheng, Ziyan Cheng, Xianhao Tian, Hongmei Liu, Weiqi Luo, Jiwu Huang. "Non-Interactive Privacy-Preserving Frequent Itemset Mining over Encrypted Cloud Data," IEEE Trans. on Cloud Computing, vol. 11, Issue 4, pp. 3452-3468, 2023
[13] Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang, “Joint cost learning and payload allocation with image-wise attention for batch steganography,” IEEE Trans. on Information Forensics & Security. vol. 19, pp. 2826-2839, Feb. 2024 .
[14] Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang, “One-class neural network with directed statistics pooling for spoofing speech detection,” IEEE Trans. on Information Forensics & Security. vol.19, pp. 2581-2593, Jan., 2024
[15] Changsheng Chen, Bokang Li, Rizhao Cai, Jishen Zeng, and Jiwu Huang, “Distortion model-based spectral augmentation for generalized recaptured document detection, IEEE Trans. on Information Forensics & Security. vol. 19, pp. 15-29, 2024.
[16] Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, and Jiwu Huang, "steganography embedding cost learning with generative multi-adversarial network" IEEE Trans. on Information Forensics & Security. vol. 19, pp. 1283-1298, Jan. 2024.
[17] Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot, "Beyond the prior forgery knowledge: mining critical clues for general face forgery detection," IEEE Trans. on Information Forensics & Security. vol. 19, pp. 1168-1182, 2024.
[18] Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang, “ReLoc: a restoration-assisted framework for robust image tampering localization,” IEEE Trans. on Information Forensics & Security. vol. 18, pp. 5243-5257, 2023.
[19] Shuanquan Tan, Qiushi Li, Yilin Chen, Bin Li, Jiwu Huang, “STD-NET: search of image steganalytic deep-learning architecture via hierarchical tensor decomposition,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2657-2673, 2023.
[20] Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, and Jiwu Huang, “Adversarial steganography embedding via stego generation and selection,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2375-2389, 2023.
[21] Xianbo Mo, Sunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang, “ReLOAD: using reinforcement learning to optimize asymmetric distortion for additive steganography,” IEEE Trans. on Information Forensics & Security. vol. 18, 1524-1538, 2023
[22] Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang, “Query-efficient adversarial attacks with low perturbation against end-to-end speech recognition systems,” IEEE Trans. on Information Forensics & Security. vol.18, no.11, pp. 351-364, 2023
[23] Changsheng Chen, Shuzheng Zhang, Fengbo Lan, Jiwu Huang, “Domain-agnostic document authentication against practical recapturing attacks,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 8, pp. 2890-2905, Aug., 2022
[24] Zhaoxu Hu, Changsheng Chen, Wai Ho Mow, Jiwu Huang, “Document recapture detection based on a unified distortion model of halftone cells,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 7, pp. 2800-2815, July, 2022
[25] Yuan Yuan, Gene Cheung, Pascal Frossard, V. H. Zhao, Jiwu Huang, “Landmarking for navigational streaming of stored high-dimensional media,” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5663-5679, Aug., 2022
[26] Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang, “Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5110-5123, Aug., 2022
[27] Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun Q. Shi, “Robust estimation of upscaling factor on double JPEG compressed images,” IEEE Trans. on Cybernetics. vol. 52, no. 10, pp. 10814-10826, Oct., 2022
[28] Shunquan Tan, Baoying Chen, Jishen Zeng, Bin Li, Jiwu Huang, “Hybrid deep-learning framework for object-based forgery detection in video.” Signal Processing: Image Communication. vol. 105, 116655, 2022.
[29] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, " Universal Deep Network for Steganalysis of Color Image Based on Channel Representation," IEEE Trans. on Information Forensics and Security, vol. 17, no. 8, pp. 3022-3036, Aug., 2022
[30] Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang, “Self-adversarial training incorporating forgery attention for image forgery localization,” IEEE Trans. on Information Forensics & Security. vol.17, pp.819-834 March 2022
[31] Weixuan Tang, Bin Li, Jin Li, Mauro Barni, Jiwu Huang, “Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge,” IEEE Trans. on. Circuits and Systems for Video. vol.32, no. 6, pp.4081-4095, June 2022
[32] Qiushi Li, Shunquan Tan, Shengda Chen, Bin Li, Jiwu Huang, “One-class double compression detection of advanced videos based on simple Gaussian distribution model,” IEEE Trans. on. Circuits and Systems for Video. 32(4), pp. 2496-2500, Apr. 2022.
[33] Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang, “Query-efficient attack for black-box image inpainting forensics via reinforcement learning,” AAAI 2025
[34] Ye Miaoxin, Saixing Zhou, Weiqi Luo, Shunquan Tan, Jiwu Huang, “GAN-based symmetric embedding costs adjustment for enhancing image steganographic security,” ACM Multimedia 2024: 7046-7054
[35] Changsheng Chen, Liangwei Lin, Yongqi Chen, Bin Li, Jishen Zeng, Jiwu Huang. , “CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images,” CVPR 2024: 15577-15586
[36] Peijia Zheng, Jiwu Huang, “Two-tier data packing in RLWE-based homomorphic encryption,” ACM CCS 2024, 2844-2858
[37] Wenmin Huang, Weiqi Luo, Jiwu Huang, Xiaochun Cao, “SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing,” AAAI 2024: 2374-2381
[38] Xianbo Mo, Shunquan Tan, Jiwu Huang, “Query-efficient black-box attack for image forgery localization via reinforcement learning,” ACM CCS 2023 (poster)
[39] Weiqi Luo, Jiwu Huang, “Automatic asymmetric embedding cost learning via generative adversarial networks,” ACM MM 2023.
[40] Peijia Zheng, Zhiwei Cai, Huicong Zeng, Jiwu Huang, “Keyword spotting in the homomorphic encrypted domain using deep complex-valued CNN,” Proc. of ACM Multimedia 2022.